Resubmissions
05-04-2024 15:05
240405-sf5bqaff88 1027-11-2023 17:10
231127-vpqk2aae84 827-11-2023 16:30
231127-tzsbyahg8y 7Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
launcher.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
launcher.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
version1.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
version1.dll
Resource
win10v2004-20240226-en
General
-
Target
launcher.bat
-
Size
62B
-
MD5
7d6b98d6fea6b32c98e4f6acb8930efe
-
SHA1
cf4689c45b1bd398ce2cf2f5c399c007166de257
-
SHA256
76ce2f0f4ac28eb39f4f06a15defec3b7a2eb4c4a55c05fa86535b1a3cdabc23
-
SHA512
35a9c5517b8e1a97bd02de5088e26050485aacd50783366f3b513b84c0886eff42d19fc8ba5369602755a3e6ed2bb5b02af50cc2f7a1b8406eba21e6f296539c
Malware Config
Extracted
latrodectus
https://mazdakrichest.com/live/
https://riverhasus.com/live/
Signatures
-
Latrodectus loader
Latrodectus is a loader written in C++.
-
Detect larodectus Loader variant 1 3 IoCs
resource yara_rule behavioral2/memory/1944-1-0x000001FE0BA80000-0x000001FE0BA93000-memory.dmp family_latrodectus_v1 behavioral2/memory/1312-11-0x0000021D0BB20000-0x0000021D0BB33000-memory.dmp family_latrodectus_v1 behavioral2/memory/1312-16-0x0000021D0BB20000-0x0000021D0BB33000-memory.dmp family_latrodectus_v1 -
Loads dropped DLL 1 IoCs
pid Process 1312 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1944 rundll32.exe 1944 rundll32.exe 1944 rundll32.exe 1944 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe 1312 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1944 3140 cmd.exe 86 PID 3140 wrote to memory of 1944 3140 cmd.exe 86 PID 1944 wrote to memory of 1312 1944 rundll32.exe 90 PID 1944 wrote to memory of 1312 1944 rundll32.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\system32\rundll32.exerundll32.exe version1.dll, scab2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_7313c66e.dll", scab3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00